General

  • Target

    4df3d2a2af68488bcac31368ded79a12de0389dd6bfdcca4baf2a66cd8c85451_NeikiAnalytics

  • Size

    2.6MB

  • Sample

    240521-pzvd3sed4v

  • MD5

    5df5d4ab23e92ff511352e9f7b30fbdc

  • SHA1

    3b08174441348ff70b3bbd7f79bc2f5155eba8f7

  • SHA256

    4df3d2a2af68488bcac31368ded79a12de0389dd6bfdcca4baf2a66cd8c85451

  • SHA512

    8d6abee8cc9073d0a6fb4a743db360e678f67df1234f7b76797d1bd853e957fbc56faeb6f7082e1ba9ebc07d904401709d64aef25cef9eae349e878151e78a59

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl5:86SIROiFJiwp0xlrl5

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      4df3d2a2af68488bcac31368ded79a12de0389dd6bfdcca4baf2a66cd8c85451_NeikiAnalytics

    • Size

      2.6MB

    • MD5

      5df5d4ab23e92ff511352e9f7b30fbdc

    • SHA1

      3b08174441348ff70b3bbd7f79bc2f5155eba8f7

    • SHA256

      4df3d2a2af68488bcac31368ded79a12de0389dd6bfdcca4baf2a66cd8c85451

    • SHA512

      8d6abee8cc9073d0a6fb4a743db360e678f67df1234f7b76797d1bd853e957fbc56faeb6f7082e1ba9ebc07d904401709d64aef25cef9eae349e878151e78a59

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl5:86SIROiFJiwp0xlrl5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Modifies Installed Components in the registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks